If you want to learn to code at an advanced level in C++ or build your own fully functional advanced keylogger from scratch for learning ethical hacking, I think you might love this course. In thiscourse you will see exactly how to create an advanced keylogger starting from nothing by literally following the steps I take as I make it.
If you want to learn to code at an advanced level in C++ or build your own fully functional advanced keylogger from scratch for learning ethical hacking, I think you might love this course. In thiscourse you will see exactly how to create an advanced keylogger starting from nothing by literally following the steps I take as I make it.
Thiskeylogger is capable of recording all the keyboard andmouse input. It can even record independent of the language settings because it logs thephysical keys on the keyboard first. Next, by using an arbitrarykeymap with human friendly names, it translates the machine keys tosomething that we can understand. It also possesses mail sendingcapabilities so you can just schedule the logfile to be sent viamail, lets say every 12 hours. In addition to this, it will also keepthe logfile encrypted. Therefore, we will create another programwhich will be able to decrypt the logfile on your end.
For learning C++, this is an ideal course because it is completely hands on learning that provides a functional end product. Some future features that will be added to the keylogger course as I develop them will include but are not limited to taking screenshots, capturing clipboard content (copy-paste), recording website URLs, and so on. Take this course now to get immediate access to the videos and to get answers to every single question you ask in the course.
As an information technology professional myself, I realize what the final product of this course is capable of. I trust in creating this that you will use it for good and for learning. If you choose to use this keylogger for any illegal or immoralpurposes, you risk losing a lot. This is only for educationalpurposes. The keylogger that you are going to see will be able tocause some serious damage, so please use it in a legal andresponsible way.
Thank you very much for reading this and I hope to see you in the course soon. Ifyou have any suggestions in regard to the functionalities of thekeylogger, feel free to send me a message or post your requests here.
Welcome all to this intro. Here I will describe this course/project. My name is Ermin and I will be your instructor for this course. In this course I will teach you how to create an advanced keylogger.
This keylogger is capable of recording more or less all the keyboard and mouse input independent of the language settings as it records the physical keys on the keyboard first, and then, by using an arbitrary keymap with human friendly names, it translates the machine keys to something that we can understand. It also possesses mail sending capabilities so you can just schedule the logfile to be sent via mail, lets say every 12 hours. In addition to this, it will also keep the logfile encrypted. Therefore, we will create another program which will be able to decrypt the logfile on your end. Please do not abuse the knowledge you get from this course as it can get you in a big trouble. Do not use this keylogger for any illegal or immoral purposes. You do not have my permission to do so. In fact, I am explicitly asking you not to do it. This is only for educational purposes. The keylogger that you are going to see will be able to cause some serious damage, so please use it in a legal and responsible way. Some future features that will be added to the keylogger will include but are not limited to taking screenshots, capturing clipboard content (copy-paste), recording website URLs, and so on.
If you have any suggestions in regard to the functionalists of the keylogger, feel free to send me a message or post your requests here.
This header will be used for all of our input/output operations. It is also used for the creation of the file where the keylogger will store recorded keystrokes. In order to achieve this, it works in conjunction with functions from Base64 and Helper headers. It creates a string of characters which contains keystrokes and then outputs them to a file. In the process of outputting, it uses the functions from Base64 header in order to encrypt the contents of the string. Since we need to create a path for the file, there are failsafe mechanisms which ensure the creation of the path with all its subdirectories.
This header is used for capturing keystrokes. It uses hooks in order to capture physical keys on the keyboard. Due to this fact, it is not relevant which keyboard does a user use. It will always be able to record the physical buttons that are pressed. The awesome thing about it is that we are able to record all the special characters and keys like shift, space, enter, alt, sleep button, mouse clicks, etc. We wont need to record all of these, but we will use them as triggers later on for certain actions like taking screenshots. Due to the nature of the hooks in Windows and what they are used for, the keylogger does not do anything out of the ordinary when compared to most of the other programs on the system.
Learn how to decrypt the encrypted files
Part 2 of how to decrypt the encrypted files.
Part 3 of how to decrypt the encrypted files.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.